Ok, email is boring. Email is antiquated. Email is NOT dead, particularly with GDPR now in everyone's minds it remains the favourite attack vector for cyber criminals! Like it or not, if you don’t show the deserved love and attention to email, criminals will keep winning.

No, User Education is not THE only answer. You need the right set of technologies that enable organisation to be cyber resilient.

Join Amar Singh, practicing CISO, as he presents 'The 5th Floor - Why Protecting Email Remains the Most Sensible Strategy' and discusses with Peter, Stefan and Junior the lessons learnt and technologies available to businesses to increase their cybersecurity maturity.

Among the top new spear phishing threats to enterprises: Extortion. Asaf Cidon of Barracuda outlines the top three spear phishing threats and new strategies to defend against them.

Cidon, Barracuda's Senior Vice President, Email Protection Products, was surprised to see how quickly extortion has taken off as a prevalent threat, as outlined by Barracuda' newest spear phishing report.

"We're seeing that attackers are increasingly bypassing existing email defenses by sending emails that include no attachments or links, and basically tell the recipient that the attacker has obtained a password to their account, and wants them to send some bitcoin, otherwise they will expose very embarrassing information about the recipient," Cidon says. "In our report, we found that these attacks comprise over 10 percent of all the spear phishing attacks."

In an interview about the spear phishing trends outlined in this report, Cidon discusses:

- Insights from Barracuda's latest report;
- Why top threats are so successful;
- New defensive strategies and solutions.

Organizations know that cloud security is different than what they were used to doing on-premises...but what many don’t realize is that cloud introduces new vulnerabilities that their on-premises world never needed to account for.

In the future, 80% of cloud breaches will be due to misconfiguration, credentials mismanagement, or insider theft – not the cloud itself. Just what do organizations need to worry about in the cloud, and how can they remediate these new vulnerabilities?

Join us to discuss these new challenges and what organizations can do to better protect themselves in the Public Cloud.

Defending your business against social-engineering and phishing attacks is crucial in today’s cyber landscape. Although your users may pose a high security risk they can also act as an additional layer of security by training them to be ever vigilant and to recognize the subtle clues of even the most cunning phishing attempts.

On this Video Meetup we’ll talk to an IT Pro from the Spiceworks Community about implementing and managing a security awareness program within their organization and the lessons learned. We’ll also be joined by an expert from Barracuda to discuss how to best protect your company and train your users to be on the lookout.

We’ll be discussing:

How to design and implement a security awareness program that uses positive reinforcement to embed effective practices through out every business process.

The importance of identifying the human risk factor through security surveys and testing utilizing the most up-to-date simulated phishing and social-engineering campaigns.

How automating your incident response can keep attacks from spreading through your organization, including sending alerts to impacted users and removing malicious emails directly from their inboxes.

One of the challenges with public cloud environments is the rate at which they change. Yet the ability to change / grow elastically is one of the key advantages to adopting public cloud. Complicate that further with a multi-cloud environment and you quickly find yourself lacking the ability to visualize your infrastructure, drill down into detail, gather resource level information and understand the relationship and interconnectivity of those resources and how they affect compliance and your security posture.

Gartner has predicted that “Through 2020, 80% of cloud breached will be due to customer misconfiguration, mismanaged credentials or insider theft, not cloud provider vulnerabilities”.

So how can you ensure your organisation not only has complete visibility of its cloud infrastructure but is also securing its workloads and apps and being compliant? Is it really an impossible task?

Find out more in this webinar with Chris Hill, RVP of Public Cloud at Barracuda Networks and Jez Back, Founder & Principal Erebus Technology Consulting Services Ltd, where they will discuss:
• The threat landscape around cloud infrastructure
• Shared security model – what are you really responsible for when it comes to cloud security
• Challenges associated with multi-cloud and keeping your organisation secure
• How to maintain compliance across your cloud environment
• How to obtain visibility of your cloud infrastructure and security posture at all times

2018 saw some great strides in cyber security as well as some major breaches. Will 2019 be the same? As we all try and stay one step ahead of the attackers and look into our crystal ball on what the future holds, Barracuda wanted to see how our customers and channel partners feel about the past, present, and future of cyber security and how their approach has evolved over time.

We surveyed more than 1,500 IT leaders and security professionals in North America, EMEA, and APJ about their IT security priorities, how those priorities have shifted, and where they’re headed next.

- What 1500 IT and security professionals in North America, EMEA and APJ believe will be the next big trends in cyber security
- How their priorities have changed over the last 15 years and where they will focus for the next 15 years
- Which cyber security trends have impacted their cyber security strategy
- How to prepare your organisation for these new trends

Register today to find out what your peers believe will be the key trends in cyber security and advice on how to stay ahead of the attackers in 2019 and beyond.

Are you open minded to saving money and ensuring that your business is better protected from cyber criminals at the same time? Join Amar Singh and Steve Vickers as they discuss a simple checklist for charities and small businesses. A non-technical discussion, we layout step by step guidance on what you can do:

- To save money on your current IT and security investments
- To ensure your third party is delivering the right level of security and service
- Increase your operational efficiency and lower total cost of operations.

Cut through the noise around SD-WAN. Join us for this all-new webinar, where we’ll dive into the eye-opening results of our recent global survey of IT administrators.

Find out what 910 of your peers around the globe are thinking, saying, and doing about the move to SD-WAN—and understand how attitudes and trends in the EMEA region differ in some respects from those in other regions.

Don’t miss this opportunity to gain a firm, practical understanding of the main SD-WAN concerns and challenges that your peers are dealing with, and how they’re achieving the right balance of WAN performance and security.

Attend this important live webinar and get the insights you need to make the best SD-WAN choices for your organization.

Multi-Cloud or hybrid environments has become a growing strategy for many organisations moving their applications and data in the cloud as it gives organisations the ability to be flexible in what they need for their business. In fact, according to recent research by Computing, 26 per cent of enterprises surveyed were using a multi-cloud approach compared with 22 per cent last year. However, along with this approach one thing organisations should not forget is that the need for security does not diminish. As the cloud continues to offer more in services, organisations need to be aware of the protection they are responsible for to ensure their applications and workloads are safe.

So how do organisations stay ahead of the curve with security as well as being able to manage these multi-cloud or hybrid environments?

Join our latest webinar where, Chris Hill, VP Public Cloud EMEA at Barracuda, and Alex Hilton, Chief Executive and Cloud Industry Forum (CIF)will discuss the latest challenges when it comes to migrating to the cloud, especially in a multi-cloud environment as well as analyse CIFs latest research findings on what organisations need to consider when adopting these cloud services.

With the explosion of cloud-based cloud ready applications, many organisations struggle with optimising application performance for cloud or hybrid environments. The culprit, in many cases, is the connectivity from the offices to the cloud. The wide area network, (WAN) connecting offices to the Internet and to other offices, is still playing catchup. WAN technology is stuck in the old-age.

Think about this: Does your business, small or large, have two or more broadband connections, maybe a broadband and a dial up or some other form of Internet connectivity? Apart from the security risk of having too many Internet points of exit, your business is also wasting money and resources in managing these various connectivity channels.

In this webinar, Amar Singh and Steve Vickers explore the problems typically faced by organisations based on the latest research and show how organisations can create a seamless and secure SD-WAN infrastructure without having to manage multiple products.

With the rise in cloud services along with remote and mobile users, Software-Defined WAN technology can act like the Force to help optimize your WAN and troubleshoot issues with as little sysadmin/Jedi intervention needed.

On this Video Meetup, we’ll be talking about SD-WAN and how it can increase performance for your users while also increasing visibility and control across your network. We’ll be talking with experts from Barracuda Networks as well as an IT pro from the Spiceworks
Community.

What we're discussing:
- How SD-WAN works with existing MPLS
- Using SD-WAN to secure traffic going across your wide network
- Weighing the cost benefit of SD-WAN

Did you know email is still the biggest threat vector for phishing, with 74% of threats entered as an email attachment or link? Does your email protection do enough to help prevent your users from being phished?

On this webinar you’ll learn how a multi-layered next generation email protection solution not only addresses the latest email threats but helps you stay ahead of the curve.

What we’ll discuss:

How advanced threats are evolving to use sophisticated techniques such as spear phishing and social engineering.

The different layers needed in a next generation email protection solution.

Knowing which threats are trending right now—and which vectors criminals are using to attack you—is the key to optimizing and fine-tuning your security policies and solutions for effective protection.
Barracuda collects a vast flow of real-time information and uses big data analytics to crunch those numbers in order to deliver up to date, actionable insights. In this interactive live session with Brianna Fischer and Fleming Shi will discuss:

• Latest threats in cyber security
• Real world examples of using threat intelligence in defending against cyber attacks
• How to use threat intelligence to fine tune your security policies
• How to gain access to the information you need to stay ahead of the biggest cyber threats

Register to learn the fastest, easiest way to get the information you need to stay ahead of the biggest cyber threat trends.

Ok, email is boring. Email is antiquated. Email is NOT dead, particularly with GDPR now in everyone's minds it remains the favourite attack vector for cyber criminals! Like it or not, if you don’t show the deserved love and attention to email, criminals will keep winning.

No, User Education is not THE only answer. You need the right set of technologies that enable organisation to be cyber resilient.

Join Amar Singh, practicing CISO, as he presents 'The 5th Floor - Why Protecting Email Remains the Most Sensible Strategy' and discusses with Peter, Stefan and Junior the lessons learnt and technologies available to businesses to increase their cybersecurity maturity.

Did you know that around 90% of all hacks start with a targeted email attack? Protect your users and their data and assets from the biggest security threat there is: themselves.

Join us for a video meetup where we’ll discuss the multi-layered security strategy you need to maximize your protection and minimize your risk.

What we’ll discuss:

- How spear phishing is evolving, and the social engineering techniques being used
- How to defend against email fraud and account compromise
- Stories from real-life attacks, and the lessons learned from them

It’s not everyday you get the inside story on how a group of cybersecurity researchers stumbled upon an APT, an advanced persistent threat, when they were examining the intelligence data from their security kit.

It appeared harmless and boring but of advanced attributes. But Fleming Shi and Jonathan Tanner suspected something was amiss.

Facilitated by Amar Singh, practising CISO, on this exclusive webinar as he unpicks what Fleming and Jonathan did next. Their curiosity got the better of them and they set about tinkering to discover the true intentions of this benign malware.

This panel of cloud and security experts will discuss the different ways enterprises are securing their cloud environments.

Join top cloud and security experts for this interactive Q&A discussion on:
- The top cloud trends in 2018
- Encryption, key management and beyond
- Biggest threats to the cloud
- How to better safeguard data and privacy

Microsoft Office 365 is so ubiquitous-with more than 100 million monthly active subscribers-that it's almost become part of our identities. Cybercriminals have taken notice-and Office 365 has become a breeding ground for an increasing number of highly sophisticated attacks.